Results 71 to 80 of about 4,930 (199)

Investigation of Blockchain for Cybersecurity in Maritime Autonomous Surface Ships

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This study investigates the application of blockchain technology to enhance cybersecurity in Maritime Autonomous Surface Ships (MASS). By conducting a SWOT/TOWS analysis and survey, it highlights the potential to improve data integrity, transparency and trust in MASS operations.
Ian Hamilton   +2 more
wiley   +1 more source

Enhancing UAV Security Against GPS Spoofing Attacks Through a Genetic Algorithm-Driven Deep Learning Framework

open access: yesInformation
Unmanned Aerial Vehicles (UAVs) are increasingly employed across various domains, including communication, military, and delivery operations. Their reliance on the Global Positioning System (GPS) renders them vulnerable to GPS spoofing attacks, in which ...
Abdallah Al-Sabbagh   +4 more
doaj   +1 more source

Security Challenges and Solutions in Self‐Driving Vehicles: A Comprehensive Review

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This article presents a comprehensive review of cybersecurity challenges and solutions in self‐driving vehicles, focusing on threats across vehicular communication, sensors, artificial intelligence (AI) systems, and data privacy. It categorises attacks based on autonomous vehicle architecture layers and highlights advanced countermeasures such as AI ...
Yaw Opoku Mensah Sekyere   +2 more
wiley   +1 more source

Quantum Geo-Encryption

open access: yes, 2016
In this work we introduce the concept of quantum geo-encryption - a protocol that invokes direct quantum encryption of messages coupled to quantum location monitoring of the intended receiver.
Malaney, Robert
core   +1 more source

Tracking Loop Distortion of BDS‐3 B1C Signal in Spoofing Scenarios: An Experimental Analysis

open access: yesIET Radar, Sonar &Navigation, Volume 20, Issue 1, January/December 2026.
This study established a feeder‐based BDS spoofing experimental platform and uses multi‐correlator tracking to systematically analyse the tracking loop distortion characteristics of BDS‐3 B1C signals under position and time spoofing, comparing differences between narrowband (NB) and wideband (WB) tracking modes.
Bo Jiao   +4 more
wiley   +1 more source

Galileo and EGNOS as an asset for UTM safety and security [PDF]

open access: yes, 2019
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan   +7 more
core  

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

Attack Identification and Correction for PMU GPS Spoofing in Unbalanced Distribution Systems

open access: yesIEEE Transactions on Smart Grid, 2020
Due to the vulnerability of civilian global positioning system (GPS) signals, the accuracy of phasor measurement units (PMUs) can be greatly compromised by GPS spoofing attacks (GSAs), which introduce phase shifts into true phase angle measurements. Focusing on simultaneous GSAs for multiple PMU locations, this paper proposes a novel identification and
Ying Zhang 0039   +2 more
openaire   +2 more sources

Controlled Laboratory Evaluation of the Evolving GNSS RFI Threat Space

open access: yesIET Radar, Sonar &Navigation, Volume 20, Issue 1, January/December 2026.
The work presented here presents the design, implementation and results produced by a novel hardware in the loop testing framework developed for global navigation satellite systems receiver testing under radiofrequency interference conditions. The simulation framework builds upon the world’s largest known database of multi‐frequency RFI events ...
Aiden J. Morrison   +2 more
wiley   +1 more source

GNSS Spoofing Detection Based on Ionospheric Model Deviation Monitoring

open access: yesIET Radar, Sonar &Navigation, Volume 20, Issue 1, January/December 2026.
The deviation of TEC (DTEC) consistency between DF measurements and empirical model estimations in authentic scenarios is not zero but is predictable through ionospheric annual periodicity. However, DF spoofers typically struggle to accurately counterfeit the authentic TEC value, which can disrupt the consistency between DTEC measurements and ...
Xiaoxuan Xu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy